Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-29154: n/a

0
High
VulnerabilityCVE-2024-29154cvecve-2024-29154
Published: Mon Mar 18 2024 (03/18/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

danielmiessler fabric through 1.3.0 allows installer/client/gui/static/js/index.js XSS because of innerHTML mishandling, such as in htmlToPlainText.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 17:27:05 UTC

Technical Analysis

CVE-2024-29154 is a cross-site scripting (XSS) vulnerability identified in the Fabric project, specifically affecting versions through 1.3.0. The root cause is improper handling of innerHTML assignments in the JavaScript file index.js, notably within the htmlToPlainText function. This function fails to sanitize or encode user-controllable input before injecting it into the DOM, allowing attackers to execute arbitrary JavaScript code in the context of the affected application. The vulnerability is classified under CWE-79 (Improper Neutralization of Input During Web Page Generation), a common and dangerous web security flaw. The CVSS 3.1 vector (7.4) indicates that the attack complexity is low (AC:L), no user interaction is required (UI:N), and the attack can be performed remotely (AV:N). However, privileges are required (PR:L), meaning the attacker must have some level of access to the system or application before exploiting the flaw. The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component, potentially impacting other parts of the system. Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a significant risk for organizations relying on Fabric for automation or deployment tasks. The lack of available patches necessitates immediate attention to code review and temporary mitigations.

Potential Impact

The exploitation of CVE-2024-29154 can lead to unauthorized script execution within the context of the affected Fabric client or GUI, potentially allowing attackers to steal sensitive information such as authentication tokens, manipulate application behavior, or perform actions on behalf of legitimate users. Since the vulnerability requires limited privileges but no user interaction, an attacker with some access to the system can escalate their capabilities or move laterally within an environment. The scope change means that the impact can extend beyond the immediate vulnerable component, affecting other integrated systems or users. This can result in data breaches, loss of integrity of deployment processes, and disruption of automated workflows. Organizations using Fabric in critical infrastructure, continuous integration/continuous deployment (CI/CD) pipelines, or cloud environments may face operational risks and reputational damage if this vulnerability is exploited.

Mitigation Recommendations

To mitigate CVE-2024-29154, organizations should immediately audit and sanitize all inputs that are processed by the htmlToPlainText function and any other code paths that assign to innerHTML in the Fabric project. Avoid using innerHTML for dynamic content insertion; instead, use safer DOM manipulation methods like textContent or createElement with proper encoding. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts. Limit privileges of users and processes interacting with Fabric to reduce the attack surface. Monitor logs and network traffic for unusual activity indicative of XSS exploitation attempts. If possible, isolate the Fabric client environment to minimize lateral movement. Engage with the Fabric project maintainers for updates and patches, and apply them promptly once available. Additionally, conduct regular security code reviews and penetration testing focused on client-side code handling dynamic content.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-03-18T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d9bb7ef31ef0b5893a4

Added to database: 2/25/2026, 9:46:03 PM

Last enriched: 2/26/2026, 5:27:05 PM

Last updated: 4/12/2026, 3:38:22 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses